N. Mayer, Model-based Management of Information System Security Risk, 2009.
URL : https://hal.archives-ouvertes.fr/tel-00402996

J. A. Zachman, A framework for information systems architecture, IBM Systems Journal, vol.26, issue.3, pp.276-292, 1987.
DOI : 10.1147/sj.263.0276

P. Saha, ed: A Systemic Perspective to Managing Complexity with Enterprise Architecture, 2013.

M. Lankhorst, Enterprise Architecture at Work -Modelling, Communication and Analysis, 2013.
DOI : 10.1007/978-3-662-53933-0

E. Dubois, P. Heymans, N. Mayer, and R. Matulevi?ius, A Systematic Approach to Define the Domain of Information System Security Risk Management, Intentional Perspectives on Information Systems Engineering, pp.289-306, 2010.
DOI : 10.1007/978-3-642-12544-7_16

N. Mayer, E. Grandry, C. Feltus, and E. Goettelmann, Towards the ENTRI Framework: Security Risk Management enhanced by the use of Enterprise Architectures Advanced Information Systems Engineering Workshops, 2015.

S. Zivkovic, H. Kuhn, and D. Karagiannis, Facilitate Modelling Using Method Integration: An Approach Using Mappings and Integration Rules, Proceedings of the 15th European Conference on Information Systems, 2007.

N. Mayer, J. Aubert, E. Grandry, C. Feltus, and E. Goettelmann, An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management based on TOGAF, ArchiMate, IAF and DoDAF, 2016.
DOI : 10.1007/978-3-319-48393-1_27

I. Band, W. Engelsman, C. Feltus, S. G. Paredes, and J. Hietala, Modeling Enterprise Risk Management and Security with the ArchiMate® Language. The Open Group, 2015.

J. Barateiro, G. Antunes, and J. Borbinha, Manage Risks through the Enterprise Architecture, 2012 45th Hawaii International Conference on System Sciences, pp.3297-3306, 2012.
DOI : 10.1109/HICSS.2012.419

F. Innerhofer-oberperfler and R. Breu, Using an Enterprise Architecture for IT Risk Management, Presented at the Information Security South Africa 6th Annual Conference, 2006.

A. Goldstein and U. Frank, A Language for Multi-Perspective Modelling of IT Security: Objectives and Analysis of Requirements, Business Process Management Workshops, pp.636-648, 2013.
DOI : 10.1007/978-3-642-36285-9_64

B. Solhaug and K. Stølen, The CORAS Language ??? why it is designed the way it is, pp.3155-3162, 2014.
DOI : 10.1201/b16387-456

J. Nielsen, Usability Engineering, 1994.